* Understanding PII and the threat landscape. * Limitations of device-focused security. * Core principles of data-centric security. * Compliance considerations and securing PII across its life cycle.